Anonymous ID: b0a9d2 July 23, 2018, 8:25 p.m. No.2258354   🗄️.is 🔗kun   >>8378

Alright. We're looking for the salt, basically. Salty tears, right? Someone want to code this into C so it runs faster?

 

cat -wlinsurance/testsalt.sh

#!/bin/sh

iteration=0

while true

do

KEY=hexdump -n 8 -e '4/4 "%08X" 1 "\n"' /dev/random

openssl enc -aes256 -in 7FG-final-request.hex -out /run/wlinsurance/7FG-final-request.key -k aa -S $KEY

TEST=openssl enc -d -aes256 -in /data/wlinsurance-20130815-A.aes256 -kfile /run/wlinsurance/7FG-final-request.key -bufsize 8 2>/dev/null | xxd -l 8 | sed 's/0000000://g' | cut -c 2-20

if [ $((iteration % 1000)) -eq 0 ]; then

echo iteration $iteration

fi

if [ "$TEST" = "6f46 30e1 c6f3 385d" ]; then

echo matching salt is $KEY

exit 0

fi

((iteration++))

done

exit 1

Anonymous ID: b0a9d2 July 23, 2018, 8:35 p.m. No.2258452   🗄️.is 🔗kun

>>2258378

 

Who's the concernfag now? I'll do the C, but I am already drunk. The garbage I posted would take 40,000 years even if we had a million of us cracking it. I have a version that will take the best guesses. I have already tried everything posted by JA.